Enforce security policies for file access and change control

Monitor and enforce security policies for sensitive unstructured data access, privileged user actions and change control. Use access policies to identify anomalous behavior such as mass copy and deletion of files and directories, detect spikes in file access activity by user, and receive alerts when monitored files are accessed improperly. Support policy-based actions such as auditing, real-time security alerts, and read and write blocking.

Accelerate compliance workflows and audit activities

Create a centralized repository that aggregates data throughout your enterprise for compliance auditing and reporting, correlation and forensics without enabling native operating system audit functions. Provide a tamper-proof audit trail that supports the separation of duties required by auditors. Deliver customizable compliance workflow automation to generate compliance reports and distribute them to oversight teams for electronic sign-offs and escalation to get the reports to the right people.

Safeguard sensitive data across heterogeneous environments

Monitor and audit activity on file systems, attached storage, and removable devices—across all leading platforms, file shares and operating systems. Support enterprise operating systems including Microsoft Windows, UNIX and Linux. Discover and classify sensitive enterprise data for all platforms and most file types. Monitor and prevent unauthorized access for all file types.

Technical details

Software requirements

Software requirements for IBM Guardium Data Protection for Files can be viewed at: